Police Intel Lecture

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 185

POLICE

INTELLIGENCE
Police Intelligence
 Intelligence information helps police to
solve cases and make arrests that can lead
to successful prosecution in court.
HISTORY
OF
INTELLIGENCE
History of Intelligence

Holy Bible
History of Intelligence
Moses - The scripture also named the 12
intelligence agents when the Lord directed
Moses to send into the Land of Canaan and
records that “all those men were heads of
the children of Israel.”
(Number 13:1-33)

Delilah - a Palestine agent who used her


charm to gain information from the powerful
enemy.
Chinese Origin
Sun Tzu
“Father of Intelligence”

“PING FA” – Art of War


“If you know your enemy and know yourself,
you need not fear the result of a hundred
battles. If you know yourself but not your
enemy, for every victory, you will suffer defeat.
If you know neither yourself nor your enemy,
you are fool who will meet defeat in every
battle.”
5 Classes of Spies According to the Art of
War
 Local Spies- employing the services of the
inhabitants of a district.
 Inward Spies- making use of officials of the enemy
 Converted Spies- getting hold of the enemy's spies
and using them for our own purposes.
 Doomed Spies- Doing certain things openly for
purposes of deception, and allowing our spies to
know of them and report them to the enemy.
 Surviving Spies - are those who bring back news
from the enemy's camp.
Alexander “The Great”
 became the first ruler to utilize
intelligence as a weapon of
government
 He divided a simple but highly
effective system of covert ciphers.
 He devised the letter sorting
system for the purpose of
intelligence gathering.
Alexander’s Cipher
Sir Francis Walsingham of
England
 he was credited with creating the first
viable secret service in England.

 he protected Queen Elizabeth I from


countless assassins. 

 employed Spies to monitor activity of


the enemy.
Mata Hari
• Also known as Margaretha
Geertruida "Margreet" MacLeod

• Ironically, Mata Hari is one of


the best known spies in history,
yet she was one of the worst.
Sertorius
When Sertorius was the Roman Commander
in Spain he was, possessor of a white
fawn that he trained to follow him every
where.

“Diana”

Used the supernatural power of the animals


to obtain information.
Frederick “the Great”

“Father of Organized Military


Espionage”
Hannibal
• Hannibal is often regarded as
one of the greatest military
strategists in history and one
of the greatest generals of
Mediterranean 
• Known for his strategy of
dressing as a beggar and went
into the streets of Rome. 
Schulmeister
Known as “Napoleon’s Eyes”

He is Napoleon’s military
secret service agent.
GENGIS KHAN

used spies and prisoners as


source of information
JULIUS CAESAR
Established body of
speculators who
served as
information
collecting Agency
Alfred Redl

One of the most


brilliant intelligence
agents, though he
was a homosexual.
Col. Rudolph Abel
Probably the highest
ranking and most
successful spy
whoever infiltrated the
United States.
Mathew Cevetic
a famous undercover
assignment of FBI
infiltrated the
communist party
RENNAISANCE
PERIOD
Richilieu

He introduced
the network of
covert collectors.
LOUIS XIV
Systemized Postal Censorship

“Also known as the


“Le Roil Soleil”
“Sun King”
Intelligence Service
Intelligence Service
An Agency that chiefly
gathers and evaluates
information for a
country’s political and
military leaders.
KINDS OF INTELLIGENCE
SERVICE
FOREIGN INTEL INTERNAL
SERVICE SERVICE
Seeks to
Gathers info neutralize hostile
about foreign intelligence
countries and security service
institutions. operating within
the country
Intelligence Agency in
the World
CIA - Central Intelligence Agency
CIA - Central Intelligence Agency

The military intelligence


agency of United States
of America and engaged
in many undercover
activities throughout the
world.
CIA - Central Intelligence Agency

Harry S. Truman – First


chief of the CIA
Mike Pompeo – Current
Chief of the CIA
KGB - Komitet Gusodarstevenoy
Bezopasnosti
KGB - Komitet Gusodarstevenoy
Bezopasnosti

• Russia
• Committee for State Security
Research and Analysis Wing
R&AW or RAW

• India’s external
intelligence agency which
has the function of
counter terrorism and
covert operations.
Inter-Services Intelligence

• Pakistani’s Intelligence
Agency
• Has the lengthiest track
record of success in
intelligence gathering
MOSSAD
MOSSAD
• Central Institute for Intelligence and
Security
• Literally means “the Institute”
• Israel
• Finest Intelligence Agency in the
world
• Has a counter-terrorists unit called
“KIDON”
KIDON

an elite group of expert


assassins who operate
under
the Caesarea branch of
the espionage
organization. 
Secret Intelligence Service
Secret Intelligence Service
 Also known as M16 (Military
Intelligence Service, Section 16)
 United Kingdom
 Motto: Semper Occultus
(Always Secret)
 Founded by Munsfield
Cumming
SDECE
SDECE
• Secret de Documentation Exterieure et
Contre- Espionage
• France
Social Affairs Department

• Abbreviated as SAD
• China
• First SAD director is
Kang Sheng
Federal Bureau of Investigation
Federal Bureau of
Investigation
• Known as FBI
• Its primary role is counter
intelligence limited to internal
security within the United States
of America.
• It’s first director is J. Edgar Hoover
• Current Director – Christopher
Wray
MAJOR INTELLIGENCE
AGENCY IN THE PHILIPPINES
NICA- National Intelligence Coordinating Agency
 
• Formerly NISA ( National Intelligence and
Security Agency )
• Executive Order 235
• the primary intelligence gathering and analysis
arm of the Philippine government, in charge of
carrying out overt, covert, and clandestine
intelligence programs.
• Its motto is: Kaalaman ay Kaligtasan 
• OFFICE OF THE PRESIDENT
National Bureau of Investigation
National Bureau of Investigation
• is an agency of the Philippine
government under the DOJ, responsible for
handling and solving major high-profile
cases that are in the interest of the nation.
• Created under R.A 157
• The Bureau has investigative jurisdiction
over (1) criminal cases, upon its own
initiative and as public interest may require;
(2) administrative and civil cases in which the
government is interested whenever
properly requested. (R.A. No. 157)
National Bureau of Investigation

• Capt. Thomas Duggan –


First Director
• Juan Pardo de Tavera –
First Filipino Director
INTELLIGENCE
INTELLIGENCE
Webster’s Definition
Capacity for understanding
and for other forms of
adaptive intellect of behavior;
the mind in operation.
CRIMINOLOGICAL DEFINITION
It is the end product resulting from
the Collection, Evaluation, Analysis,
Integration and Interpretation of all
available information, which may
have immediate or potential
significance to the development and
execution of plans and program of
the user.
The four (4) I’s of Intelligence

 Interest
 Integrity
 Ingenuity
 Intelligence
Information
An evaluated material of
every description including
those derived from
observation, reports,
rumors and other source of
information.
Three Broad Categories
of Intelligence
1. National Intelligence
• Integrated products of
intelligence developed by all
government department
concerning national policy and
national security.
• It is the total product of
intelligence division by all agencies
to coordinate the activities of
governmental policies.
2. Department Intelligence
It is a type intelligence
required by an agency or
department of the
government in order to
execute its mission and
responsibilities.
3. Military Intelligence
Is a type of intelligence
used in the preparation and
execution of military/ police
plans, programs and
policies.
PRINCIPLES OF INTELLIGENCE
1. The Principle of
Objectivity/Objectiveness
 Intelligence must be based on the
decision-makers’ own plans and
intentions as much as an
consideration of the intelligence
targets.

 In intelligence, only well guided


will succeed.  
2. The Principle of Interdependence

 Mutually dependent
 Operation and intelligence
planners work hand and hand to
attain a greater degree of success
in their common effort. This goes
also to logistics, personnel,
plans/programs, training and
budget. 
3. Principle of Continuity
It simply means that
information, events, and
reports must be continuous
and intelligence activities
follow a simple continuous
intelligence cycle.
4. Principle of Communication
Intelligence adequate to their needs
must be communicated to all the
decisions makers in a manner that
they will understand and inform that
will permit its most effective use.
Intelligence is useless if it remains in
the minds, or in the files of its
collectors or its producers.
5. Principle of Selection

Intelligence should
be essential and
pertinent to the
purpose at hand.
6. Principle of Timeliness

Intelligence must be
communicated or must
be available on time
to the decision maker
to permit its most
effective use.
7. Principle of Usefulness

Intelligence must be
adequate for the
purpose for which it
will be utilized.
7. Principle of Flexibility

Intelligence
must have the
ability to adjust
8. Principle of Security

Security is achieved by
measures which the
intelligence takes to protect
and preserve the integrity of
its organization personnel,
method, sources, information
and results of its activities.
 
Police Intelligence
Police Intelligence
 The end product resulting from the
collection, Evaluation, analysis,
integration and interpretation of all
available information regarding
criminal activity of criminal violators.
 KEYWORD IS CEAII
 It is the knowledge necessary in the
preparation and execution of Police
Plans, Policies and Programs.
THREE TYPES OF POLICE
  INTELLIGENCE
 Strategic Intelligence - Intelligence
information which is primarily long- range in
nature with little or no immediate practical
value.
 Counter Intelligence - It deals with defending
of the organization against it criminal enemies
(Defensive Effort)
 Line Intelligence(combat)- The type of
intelligence which is of an immediate nature
and necessary for more effective planning and
operations.(Offensive Effort)
Strategic Intelligence
 An intelligence activity which is primarily
long range in nature.
 No Immediate Practical action required
LINE INTELLIGENCE
 Kind of intelligence acquired by
the commander to provide for
planning and conduct tactical
administrative operation in
counter insurgency.
 Short term in nature
 Requires immediate action
COUNTER INTELLIGENCE
Phase of Intelligence covering
the activity devoted in
destroying the effectiveness of
hostile foreign activities and to
the protection of info against
espionage, subversion and
sabotage.
FORMS OF POLICE
INTELLIGENCE
GATHERING
Overt
When the information or
documents are procured
openly without regard as to
whether the subject of
investigation becomes
knowledgeable of the purpose
or purposes for which it is
being gathered.
Covert
When the information is
obtained without the
knowledge of the person
against whom the
information or documents
may be used.
Semi Overt/ Covert
When the information is
obtained from open sources
but the person against
whom the said information
will be used do not have
any knowledge about it.
Classification of Police
Intelligence
 Criminal Intelligence ( CRIMIN ) – Knowledge
essential to prevention of crimes and the
investigation, arrest and prosecution of
offenders.
 Internal Security Intelligence ( INSINT ) –
Knowledge essential on the maintenance of
peace and order.
 Public Safety Intelligence ( PSINT ) –
Knowledge Essential to ensure protection of
lives and Property.
TERMS TO REMEMBER
 Espionage - refers to the collection of secret
information that a government or organizations
does not want any outsider to know.
 Sabotage - is an action against material, premises
or utilities or production, which ensures, interferes
with or obstruct the national security or ability of a
nation to prepare for war.
 Subversion - is an action principally clandestine
or covert designed needed to undermine the
military, economic, psychological, morale or
political strength of a regime.
THE INTELLIGENCE CYCLE
1. PLANNING AND DIRECTION

Involves determination of
intelligence requirements,
priorities, selection of
intelligence agency and
means of supervision
2. COLLECTION OF INFORMATION

Involves the systematic


exploitation of sources of
information by collection
agency and the delivery of
information to proper
intelligence unit.
Methods of Collection of
Information
 OVERT
 COVERT
3. PROCESSING
 The phase of Intelligence
cycle where information
becomes intelligence.
 It involves RECORDING,
EVALUATION AND
INTERPRETATION OF
INFORMATION.
Processing involves the ff:
 Recording – reduction of information
into writing.
 Evaluation – The determination of
the pertinence of the information
reliability.
 Pertinence ( Usefulness) – Does it has
value?
 Reliability ( Dependable ) – Judging the
source of Information
 Credibility (Truth of Information ) – Is
there possibility that the information
have taken place?
Processing involves the ff:
 Interpretation - establishing the
meaning and significance of
information.
 Analysis – Determination of
significance of info
 Integration – It is combination of
elements of info
 Deduction – The formulation of
conclusions
EVALUATION GUIDE
RELIABILITY OF INFO ACCURACY OF INFO SOURCES OF
INFORMATION
A - Completely Reliable 1 - Confirmed by other T – Direct Observatiom by
  sources the commander.

B - Usually Reliable 2 - Probably true U – Reports by Penetration


Agent

C - Fairly Reliable 3 - Possibly true V – Report by PNP/ AFP


troops involved in the
encounter
D - Not Usually Reliable 4 - Doubtfully true W – Interrogation of capture
enemy agent

E - Unreliable 5 - Improbable X – Observation of


Government and civilian
F- Reliability not known 6 - Truth cannot be judged employeee
Y - Observation of the
member of populace
CRIME RATE INCREASE
CRI = Present Number – Previous Number
X100%
Previous Number

CRI= 928-750 x
100%
750
CRIME RATE DECREASE
CRI = Present Number – Previous Number
X100%
Previous Number

CRI= 750-928 x
100%
928

-19.18%
4. Dissemination
 The timely conveyance of
information by any suitable
means to those who needs it.
 Timeliness
 Propriety
Police Intelligence
Operation
SOURCE
That from which anything
comes forth, regarded as its
cause or origin.
OPEN – 99 % of the information
are collected through open
sources.
CLOSE – 1 % of the info are from
close source.
PERSONS AS SOURCES
 INFORMANT – person
who gives information
for free.
 INFORMER – Those who
give information to the
police for price or
reward.
CATEGORIES OF INFORMANTS
 INCIDENTAL INFORMANTS – no intention of
repeating their services or furnishing
information on a continuing basis.
 CASUAL INFORMANTS – individuals who by
social or professional positions are
expected to give information.
 RECRUITED INFORMANTS – selected ,
trained and utilized as continuous covert
sources of information.
Types of Recruited Informants
 ORDINARY INFORMANTS - obtained
information on their daily routine.
 PENETRATION INFORMANTS –
Assigned with the mission of obtaining
information within specific target.
 Full time Informants - Those that is
available all the time.
 Double Agents - Individual employed
by two opposing parties.
MAIN REASONS FOR INFORMING

 Profit
 Elimination of competition
 Self Aggrandizing
 Emotions
SURVEILLANCE
Surveillance
A form of clandestine
investigation which of
keeping persons, places,
objects and other targets
under close observation in
order to obtain information
of evidence relating to a
certain case.
IMPORTANT TERMS TO REMEMBER
 Subject/ Rabbit – The person that is being followed
 Surveillant – The person who conducts
surveillance.
 Made/Burnout- When the subject becomes aware
that he is under surveillance
 Lost – The Surveillants did not know the where
about of the subject.
 Undercover man - it refers to a person trained to
observe and penetrate certain organization
suspected of illegal activities and later reports the
observations and information so that operational
action can be made.
IMPORTANT TERMS TO
REMEMBER
 Bugging - it is the placement of a hidden
microphone to the target / area to collect
information from conversation.
 Wire tapping - a method of collecting
information through interception of
telephone conversation.
  Pre Surveillance Conference – a Conference
held among the team members before a
surveillance is conducted.
IMPORTANT TERMS TO REMEMBER
 Stake Out/Plant – observation of places, people
or area in a fixed position.
 Tailing or Shadowing – it is the observation of
a person’s movement .
 Liaison Program – This is the assignment of
trained intelligence personnel to other agency
in order to obtain information of police
intelligence value.
 Safe House – a place or building where the
police meet his agents for debriefing or
meeting.
IMPORTANT TERMS TO REMEMBER
 Drop – a convenient , secure and unusual
place where the police or informant by a pre
arrangement leaves note ,packages or an
envelope.
 Convoy - an accomplice or associate of the
subject.
 Decoy – any person almost similar to the
subject used to elude or avoid the surveillant.
 Contact –any person or things that the subject
dealt with when he is under surveillance.
IMPORTANT TERMS TO REMEMBER
 Live Drop – two persons meet to
exchange items
 Dead Drop Spike – concealment
device used to hide money, maps or
other important documents
 Cut Out – method or channel of
communication exchanging
information between agents
TYPES OF SURVEILLANCE
 Close surveillance ( Tight
Surveillance ) The Subject is kept
under close surveillance.
 Open Surveillance ( Rough
Surveillance ) Surveillance with
no or little attempt of
concealment.
 Loose Surveillance ( Discreet
Surveillance ) – A cautious
METHODS FOR TAILING
• One man Shadow – The most
commonly used because of the least
number of men used.
• Two Man Shadow – This is more
Advantageous because it permits
immediate change and less likely to
be recognize.
• Three Man Shadow or ABC Method
CASING
is the reconnaissance and
surveillance of a place,
building, or area to
determine its suitability for
intelligence use or its
vulnerability in an
intelligence operation.
Method of CASING
 Personal Reconnaissance –
The most effective method
and will produced the most
information.
 Map Reconnaissance
 Researched Hearsay
 Prior Information
COVER
 Meant by which an individual, group
or organization conceals the true
nature of its activities from the
observer.
 Cover Story – A biographical account,
true or fictitious, which portray the
personality which an agent assumed.
 Cover Support - An agent assigned on
target areas with the primary mission
of supporting cover story.
TYPES OF COVER
 Natural Cover – Using true or actual
personal background to fit the
purpose.
 Artificial Cover – using biographical
data adopted for a fictitious purpose.
 Cover within a Cover – use of
secondary to justify existence.
 Multiple Cover - Cover within a cover.
UNDERCOVER ASSIGNMENT

An investigative
technique in which an
agent conceals his official
identity in order to obtain
information from a target
organization
Types of Undercover Assignment
 Dwelling – establish residence in or near
the target area.
 Work Assignment – Observation at the
place of work
 Social – Places of entertainment and
amusement frequented by targets.
 Multiple Assignments - 2 or more
assignments cover simultaneously.
 Rope Job – Strike Friendship with the
subject.
ELICITATION
It is a system or plan whereby
information of intelligence value
is obtained through the process
of direct intercommunication in
which one or more party is
unaware of specific purpose of
conversation.
Devices in the Conduct of Elicitation

 APPROACH - Process of
setting people to start
talking.

 PROBE - to keep the people


talking
 
 
Four Classified Matters in
Document Security
Top Secret (Green Color code)

Any information and


materials, the authorized
disclosure of it would cause
exceptionally grave damage
to the nation, politically,
economically or militarily.
Secret (Red Color Code)
Any information and materials,
the unauthorized disclosure of
which endanger National
Security, causes serious injury to
the interest and prestige of the
nation or of any government
activity or of great advantage to
foreign nation.
Confidential (Blue Color Code)
Any information and material the
unauthorized disclosure of which
would be prejudicial to the
interests and prestige to the
national or governmental activity
or would cause administrative
embarrassment or unwanted
injury to and or would be of
advantage to foreign nations.
Restricted (White or No Color Code)

Any information and material


which requires special
protection other than those
determined to be confidential,
secret, and top secret. Yet prior
to release require clearance
with the records custodian.
COMPARTMENTATION
Grant of access and security
clearance to the classified
matters.
Types of Security Clearance
 Interim - is a temporary clearance given to an
individual while Partial Background
Investigation (PBI) is still going on.
 Good for 2 years

 Final Clearance - is given to an individual


whose PBI is completed. (Complete
Background Investigation “CBI”)
 Good for 5 Years
Any Questions?
“That in all things, God may be glorified”
1. Known as Napoleon eye, he
conducted counter intelligence
against spies, who utilized deceit
and black mail to gain information.

a. Schulmeister c. Steiber
b. Edward I d. Redl
2. Known protector of Queen Elizabeth I
who organized the British secret Police to
detect the naval operation and fleet
movements of Portugal.

a. Walshingham of England c. Steiber


b. Edward I d. Redl
3. The Russian king of sleuth hounds, he
utilized censorship and statistics in
intelligence accounting.

a. Walshingham of England c. Steiber


b. Edward I d. Redl
4. Who is the father of organized Military
Espionage?

a. Alexander the Greatc. Frederick the Great


b. Hannibal d. Moses
5. Finest Intelligence Agency in the
world.

a. KGB c. CIA
b. Mossad d. NBI
6. An Intelligence Data that is immediate in nature.

a. Line Intelligence c. Strategic Intelligence


b. Counter Intelligence d. Combat Intelligence
7. If the information is procured without the
knowledge of the subject it is said to be:

a. Covert c. Undercover
b. Overt d. Surveillance
8. Agency vested with handling
domestic intelligence in the United
States.

a. CIA c. FBI
b. Scotland Yard d. NICA
9. An Intelligence material given an evaluation
code of A1 would mean:

a. Completely Reliable, Probably True


b. Completely Reliable, Confirmed by other
sources
c. Usually Reliable, Probably True
d. Usually Reliable, Possibly True
10. It refers to the combination of all
analyzed data to form a logical picture or
theory.

a. Integration
b. Deduction
c. Evaluation
d. Interpretation
11. Wide variety of tactics employed by which a
state or person misleads or confuses the enemy;
generally as to its capabilities.

a. Deception
b. Sabotage
c. Infiltration
d. Espionage
12. It is undertaken by shifting and sorting
all available intelligence material.

a. Analysis
b. Integration
c. Deduction
d. Evaluation
13. A vehicle fronting the Principal Vehicle to
Neutralize possible treat.

a. Escort Vehicle
b. Counter Attack Vehicle
c. Decoy Vehicle
d. Shield Vehicle
14. A method of collection of information wherein
the investigator trails the subject.

a. Research
b. Surveillance
c. Casing
d. Undercover Operation
15. They are considered as irreplaceable official
matters the unauthorized disclosure of which
would cause exceptionally grave damage to
the interest of an establishment since it is vital
to its survival.
a. Top Secret Document
b. Secret Document
c. Confidential Document
d. Restricted Document
Check Your
Own Paper!
1. Known as Napoleon eye, he
conducted counter intelligence
against spies, who utilized deceit
and black mail to gain information.

a. Schulmeister c. Steiber
b. Edward I d. Redl
1. Kwown as Napoleon eye, he
conducted counter intelligence
against spies, who utilized deceit
and black mail to gain information.

a. Schulmeister c. Steiber
b. Edward I d. Redl
2. Known protector of Queen Elizabeth I
who organized the British secret Police to
detect the naval operation and fleet
movements of Portugal.

a. Walshingham of England c. Steiber


b. Edward I d. Redl
2. Known protector of Queen Elizabeth I
who organized the British secret Police to
detect the naval operation and fleet
movements of Portugal.

a. Walshingham of England c. Steiber


b. Edward I d. Redl
3. The Russian king of sleuth hounds, he
utilized censorship and statistics in
intelligence accounting.

a. Walshingham of England c. Steiber


b. Edward I d. Redl
3. The Russian king of sleuth hounds, he
utilized censorship and statistics in
intelligence accounting.

a. Walshingham of England c. Steiber


b. Edward I d. Redl
4. Who is the father of organized Military
Espionage?

a. Alexander the Greatc. Frederick the Great


b. Hannibal d. Moses
4. Who is the father of organized Military
Espionage?

a. Alexander the Greatc. Frederick the Great


b. Hannibal d. Moses
5. Finest Intelligence Agency in the
world.

a. KGB c. CIA
b. Mossad d. NBI
5. Finest Intelligence Agency in the
world.

a. KGB c. CIA
b. Mossad d. NBI
6. An Intelligence Data that is immediate in nature.

a. Line Intelligence c. Strategic Intelligence


b. Counter Intelligence d. Combat Intelligence
6. An Intelligence Data that is immediate in
nature.

a. Line Intelligence c. Strategic Intelligence


b. Counter Intelligence d. Combat Intelligence
7. If the information is procured without the
knowledge of the subject it is said to be:

a. Covert c. Undercover
b. Overt d. Surveillance
7. If the information is procured without the
knowledge of the subject it is said to be:

a. Covert c. Undercover
b. Overt d. Surveillance
8. Agency vested with handling
domestic intelligence in the United
States.

a. CIA c. FBI
b. Scotland Yard d. NICA
8. Agency vested with handling domestic
intelligence in the United States.

a. CIA c. FBI
b. Scotland Yard d. NICA
9. An Intelligence material given an evaluation
code of A1 would mean:

a. Completely Reliable, Probably True


b. Completely Reliable, Confirmed by other
sources
c. Usually Reliable, Probably True
d. Usually Reliable, Possibly True
9. An Intelligence material given an evaluation
code of A1 would mean:

a. Completely Reliable, Probably True


b. Completely Reliable, Confirmed by other
sources
c. Usually Reliable, Probably True
d. Usually Reliable, Possibly True
10. It refers to the combination of all
analyzed data to form a logical picture or
theory.

a. Integration
b. Deduction
c. Evaluation
d. Interpretation
10. It refers to the combination of all
analyzed data to form a logical picture or
theory.

a. Integration
b. Deduction
c. Evaluation
d. Interpretation
11. Wide variety of tactics employed by which a
state or person misleads or confuses the enemy;
generally as to its capabilities.

a. Deception
b. Sabotage
c. Infiltration
d. Espionage
11. Wide variety of tactics employed by which a
state or person misleads or confuses the enemy;
generally as to its capabilities.

a. Deception
b. Sabotage
c. Infiltration
d. Espionage
12. It is undertaken by shifting and sorting
all available intelligence material.

a. Analysis
b. Integration
c. Deduction
d. Evaluation
12. It is undertaken by shifting and sorting
all available intelligence material.

a. Analysis
b. Integration
c. Deduction
d. Evaluation
13. A vehicle fronting the Principal Vehicle to
Neutralize possible treat.

a. Escort Vehicle
b. Counter Attack Vehicle
c. Decoy Vehicle
d. Shield Vehicle
13. A vehicle fronting the Principal Vehicle to
Neutralize possible treat.

a. Escort Vehicle
b. Counter Attack Vehicle
c. Decoy Vehicle
d. Shield Vehicle
14. A method of collection of information wherein
the investigator trails the subject.

a. Research
b. Surveillance
c. Casing
d. Undercover Operation
14. A method of collection of information wherein
the investigator trails the subject.

a. Research
b. Surveillance
c. Casing
d. Undercover Operation
15. They are considered as irreplaceable official
matters the unauthorized disclosure of which
would cause exceptionally grave damage to
the interest of an establishment since it is vital
to its survival.
a. Top Secret Document
b. Secret Document
c. Confidential Document
d. Restricted Document

You might also like